Information Security Stack Exchange is a question and answer site for information security professionals. It only takes a minute to sign up.
Sign up to join this community
Anybody can ask a question
Anybody can answer
The best answers are voted up and rise to the top
This is something I’ve been curious about for some time, regarding these attacks based on the frequency emitted by a keyboard. Is the attacker required to have the frequencies of each key of the target keyboard before hand?